CVE-2025-40273
BaseFortify
Publication date: 2025-12-06
Last updated on: 2025-12-08
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's NFS server (NFSD) related to the handling of copynotify stateids. When a client performs an OPEN operation creating a parent stateid, followed by a COPY_NOTIFY using that stateid, and then the client reboots, the new client instance forces expiration of the previous client state. This causes the open state to be freed, but the associated copynotify stateid may not be freed properly, leading to a warning and potentially list corruption when the system later tries to free the copynotify stateid. The patch fixes this by ensuring the copynotify stateid is freed when the parent stateid is freed.
How can this vulnerability impact me? :
This vulnerability can cause internal errors and kernel warnings, potentially leading to system instability or crashes due to list corruption in the NFS server state management. This could affect the reliability of NFS services on the affected Linux kernel versions, possibly disrupting file sharing operations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring the system logs for warnings related to nfsd, specifically messages like: WARNING: CPU: ... at fs/nfsd/nfs4state.c:1550 nfs4_free_ol_stateid+... [nfsd]. You can use commands such as 'dmesg | grep nfsd' or 'journalctl -k | grep nfsd' to look for these warning messages indicating the issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves applying the patch that properly frees the associated copynotify stateid to prevent list corruption. Until patched, monitoring for the warning messages and avoiding client reboots that trigger the issue may help reduce impact. Ultimately, updating the Linux kernel to a version that includes the fix is necessary.